US10552511B2 - Systems and methods for data-driven anomaly detection - Google Patents
Systems and methods for data-driven anomaly detection Download PDFInfo
- Publication number
- US10552511B2 US10552511B2 US14/220,050 US201414220050A US10552511B2 US 10552511 B2 US10552511 B2 US 10552511B2 US 201414220050 A US201414220050 A US 201414220050A US 10552511 B2 US10552511 B2 US 10552511B2
- Authority
- US
- United States
- Prior art keywords
- data
- region
- interest
- control limit
- reference data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/18—Complex mathematical operations for evaluating statistical data, e.g. average values, frequency distributions, probability functions, regression analysis
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B23/00—Testing or monitoring of control systems or parts thereof
- G05B23/02—Electric testing or monitoring
- G05B23/0205—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
- G05B23/0218—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults
- G05B23/0224—Process history based detection method, e.g. whereby history implies the availability of large amounts of data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/24—Classification techniques
- G06F18/243—Classification techniques relating to the number of classes
- G06F18/2433—Single-class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection
Definitions
- the present disclosure relates generally to anomaly detection, and in particular, to a system and method for detecting at least one abnormal event in a system from data associated with functioning of the system.
- the present technique can overcome the limitations mentioned above by using statistical models, data mining techniques and heuristic search methods to detect anomalies in a system. This technique is automatic and can be used to monitor the automated system in real time and it reduces the number of false positives.
- a method for data-driven anomaly detection includes identifying a region of interest from the data based on dimensionality reduction technique and change point detection algorithm.
- the data within the region of interest is mapped with one or more predefined groups of reference data representing one or more modes of operation of a system, wherein the reference data represent normal operating condition of the system.
- at least one abnormal event is detected by applying a heuristic algorithm on the data within the region of interest which are outside the control limit.
- the method includes identifying a region of interest from the data based on dimensionality reduction technique and change point detection algorithm.
- Reference data are classified into one or more groups representing one or more modes of operation of a system, wherein the reference data is obtained from a region outside the region of interest.
- a control limit is determined for each of the one or more groups by analyzing the reference data.
- the data within the region of interest are mapped with the one or more groups. Then, it is determined if the data within the region of interest is outside the control limit of the mapped group of the one or more predefined groups. Finally, at least one abnormal event is detected by applying a heuristic algorithm on the data within the region of interest which are outside the control limit.
- a system for data-driven anomaly detection includes a region of interest identification module, a mapping module, a data analysis module and an abnormal event detection module.
- the region of interest identification module is configured to identify a region of interest from the data based on dimensionality reduction technique and change point detection algorithm.
- the mapping module is configured to map the data within the region of interest with one or more predefined groups of reference data representing one or more modes of operation of the system, wherein the reference data represent normal operating condition of a system.
- the data analysis module is configured to determine whether the data within the region of interest is outside of a predefined control limit of the corresponding mapped group of the one or more predefined groups and the abnormal event detection module is configured to detect at least one abnormal event by applying a heuristic algorithm on the data within the region of interest which are outside the control limit.
- the system includes a region of interest identification module, a reference data classification module, a control limit determination module, a mapping module, a data analysis module and an abnormal event detection module.
- the region of interest identification module is configured to identify a region of interest from the data based on dimensionality reduction technique and change point detection algorithm.
- the reference data classification module is configured to classify reference data into one or more groups representing one or more modes of operation of a system, wherein the reference data is obtained from a region outside the region of interest.
- the control limit determination module is configured to determine a control limit for each of the one or more groups by analyzing the reference data.
- the mapping module is configured to map the data within the region of interest with the one or more groups.
- the data analysis module is configured to determine whether the data within the region of interest is outside the control limit of the mapped group of the one or more predefined groups and the abnormal event detection module is configured to detect at least one abnormal event by applying a heuristic algorithm on the data within the region of interest which are outside the control limit.
- a computer-readable storage medium for data-driven anomaly detection which is not a signal stores computer executable instructions for identifying a region of interest from the data based on dimensionality reduction technique and change point detection algorithm, mapping the data within the region of interest with one or more predefined groups of reference data representing one or more modes of operation of a system, wherein the reference data represent normal operating condition of the system, determining whether the data within the region of interest is outside of a predefined control limit of the corresponding mapped group of the one or more predefined groups and detecting at least one abnormal event by applying a heuristic algorithm on the data within the region of interest which are outside the control limit.
- the computer-readable storage medium which is not a signal stores computer executable instructions for identifying a region of interest from the data based on dimensionality reduction technique and change point detection algorithm, classifying reference data into one or more groups representing one or more modes of operation of a system, wherein the reference data is obtained from a region outside the region of interest, determining a control limit for each of the one or more groups by analyzing the reference data, mapping the data within the region of interest with the one or more groups, determining whether the data within the region of interest is outside the control limit of the mapped group of the one or more predefined groups and detecting at least one abnormal event by applying a heuristic algorithm on the data within the region of interest which are outside the control limit.
- FIG. 1 is a computer architecture diagram illustrating a computing system capable of implementing the embodiments presented herein.
- FIG. 2 is a flowchart, illustrating a method for data-driven anomaly detection if two data sets namely reference data and test data are available, in accordance with an embodiment of the present invention.
- FIG. 3 is a flowchart, illustrating a method for data-driven anomaly detection if only test data is available, in accordance with an embodiment of the present invention.
- FIG. 4 is a plot of measure to identify the region of interest, in accordance with an embodiment of the present invention.
- FIG. 5 is a block diagram illustrating a system for data-driven anomaly detection if two data sets namely reference data and test data are available, in accordance with an embodiment of the present invention.
- FIG. 6 is a block diagram illustrating a system for data-driven anomaly detection if only test data is available, in accordance with an embodiment of the present invention.
- Exemplary embodiments of the present invention provide a system and method for data-driven anomaly detection. This involves identifying a region of interest in the data based on dimensionality reduction technique and change point detection algorithm. If no reference data is available, wherein the reference data represent normal operating condition of a system, then the reference data is obtained from the test data itself. In this case, the region outside the region of interest acts as the reference data. The data within the region of interest are mapped with one or more groups of reference data, wherein the one or more groups represent one or more modes of operation of the system. Each of the one or more groups has a control limit defined. If it is determined that the data within the region of interest is outside of the control limit of the corresponding mapped group then it indicates the anomaly. The abnormal event is then detected by applying a heuristic algorithm on the data within the region of interest which are outside the control limit.
- FIG. 1 illustrates a generalized example of a suitable computing environment 100 in which all embodiments, techniques, and technologies of this invention may be implemented.
- the computing environment 100 is not intended to suggest any limitation as to scope of use or functionality of the technology, as the technology may be implemented in diverse general-purpose or special-purpose computing environments.
- the disclosed technology may be implemented using a computing device (e.g., a server, desktop, laptop, hand-held device, mobile device, PDA, etc.) comprising a processing unit, memory, and storage storing computer-executable instructions implementing the service level management technologies described herein.
- a computing device e.g., a server, desktop, laptop, hand-held device, mobile device, PDA, etc.
- the disclosed technology may also be implemented with other computer system configurations, including hand held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, a collection of client/server systems, and the like.
- the computing environment 100 includes at least one central processing unit 102 and memory 104 .
- the central processing unit 102 executes computer-executable instructions. In a multi-processing system, multiple processing units execute computer-executable instructions to increase processing power and as such, multiple processors can be running simultaneously.
- the memory 104 may be volatile memory (e.g., registers, cache, RAM), non-volatile memory (e.g., ROM, EEPROM, flash memory, etc.), or some combination of the two.
- the memory 104 stores software 116 that can implement the technologies described herein.
- a computing environment may have additional features.
- the computing environment 100 includes storage 108 , one or more input devices 110 , one or more output devices 112 , and one or more communication connections 114 .
- An interconnection mechanism such as a bus, a controller, or a network, interconnects the components of the computing environment 100 .
- operating system software provides an operating environment for other software executing in the computing environment 100 , and coordinates activities of the components of the computing environment 100 .
- FIG. 2 is a flowchart, illustrating a method for data-driven anomaly detection if two data sets namely reference data and test data are available, in accordance with an embodiment of the present invention.
- the reference data represent the normal condition of the system and test data represent abnormal condition of the system.
- the abnormal event satisfies the following condition:
- test data is to be construed as “data” mentioned in the claims.
- a region of interest from the test data is identified based on dimensionality reduction technique and change point detection algorithm, as in step 202 .
- the data or test data can be obtained from sensors attached to the system or from manual observation of the functioning of the system. In a preferred embodiment, the data is obtained from the sensors and this will be taken into consideration for describing the present technique but this is only for understanding purpose and does not intend to limit the scope of the disclosure.
- the data can be stored and extracted from a database or can be obtained from sensors directly in real time. The data may be preprocessed to remove incomplete and irrelevant data.
- the preprocessing step may include removing the entire column of sensor readings if the sensor readings of the corresponding column are entirely zero in both reference data and test data and/or removing the entire row of sensor readings at each time instance if the sensor reading of the corresponding row is entirely zero and/or removing the entire column of sensor reading if the sensor reading of the corresponding column is same in both the reference data and test data and/or removing the columns which are linearly dependent or correlated with other columns.
- the dimensionality reduction technique may include but is not limited to T 2 statistic.
- S j (i) is the sensor reading for j th sensor at time instance i;
- m j is the mean of sensor values over time for the j th sensor
- S ⁇ 1 is the inverse of standard covariance matrix using successive difference.
- I is the number of sampling time period and rest of the notations shall be construed as mentioned above.
- T 2 -chart (in the y-axis) is plotted against sampling time (in the x-axis) to identify the region of interest using the Lavielle's change-point detection algorithm.
- FIG. 4 is a plot of measure to identify the region of interest, in accordance with an embodiment of the present invention and 402 in the figure shows the region of interest.
- the region of interest can be calculated from multi-modal pattern by using a statistic which is based on cumulative sums of differences from the mean. Steady increase in the obtained statistic indicates that the T-square statistic values are above the overall mean. Steady decrease in the obtained statistic indicates that the T-square statistic values are below the mean.
- the change in the pattern will be indicated by abrupt changes in the slope.
- the slope is computed for all pairs of peak and trough.
- the pair with farthest slope from the mean of all slopes will contain the region of interest. Hence, determine the region of interesting by finding out the pair of peak and trough for which slope is farthest away from the mean of all slopes.
- the data within the region of interest is mapped with one or more predefined groups of reference data, as in step 204 .
- the reference data can be obtained in the same way as the test data is collected.
- the reference data can be preprocessed like the test data and may be normalized by using any normalizing measure which may include but is not limited to mean and relative proportion.
- an appropriate clustering technique is used based on the type of reference data to classify the reference data into different groups, wherein the said different groups represent one or more modes of operation of the system.
- two types of clustering approaches are used namely, partition based clustering and hierarchical clustering. Based on the type of reference data the clustering algorithm is selected.
- k-means and expectation maximization clustering algorithm is used if the data is continuous and if the data is categorical then robust clustering for categorical attributes is applied.
- a control limit is determined for each group of the reference data based on the type of the reference data.
- the central tendency and dispersion of each of the groups of reference data is measured. Measurement of central tendency and dispersion may include but are not limited to mean and standard deviation of each group of reference data.
- the overall mean vector is the mean sensor values over time for each sensor. The mean value can be calculated as follows:
- m j is the mean of sensor values over time for the j th sensor
- i index the sampling time
- I number of sampling time period
- s j (i) Sensor reading for j th sensor at time instance I;
- j index the sensor number.
- the standard deviation can be calculated as follows:
- d j is the standard deviation of sensor values over time for the j th sensor
- m j is the mean of sensor values over time for the j th sensor
- i index the sampling time
- I number of sampling time period
- s j (i) Sensor reading for j th sensor at time instance I.
- the upper control limit and lower control limit of each group of the reference data can be obtained from the said mean and standard deviation.
- u j is the upper control limit for sensor j
- m j is the mean of sensor values over time for the j th sensor
- d j is the standard deviation of sensor values over time for the j th sensor
- l j is the lower control limit for sensor j
- m j is the mean of sensor values over time for the j th sensor
- d j is the standard deviation of sensor values over time for the j th sensor
- the mapping in step 204 is done based on the closeness between the mean vector of each group of the reference data and the actual sensor reading of the test data.
- step 206 of FIG. 2 it is determined if the data or sensor readings within the region of interest of the test data fall outside of the said control limit.
- the sensor reading is flagged with ⁇ 1, 0, and 1 for each scenario as follows: if the sensor reading is lying outside the lower control limit then the corresponding value is flagged with ⁇ 1, else if the sensor reading is lying within the control limits then the corresponding value is flagged with 0, and if the sensor reading is lying outside the upper control limit then the corresponding value is flagged with 1.
- the resulting value can be called as flagged value.
- the flagging is performed for the reference data set. Thereafter, the at least one abnormal event is detected by applying a heuristic algorithm, as in step 208 .
- the data can be preprocessed before applying heuristic algorithm.
- the heuristic algorithm uses the flagged values to determine the anomaly or abnormal event.
- the flagged values are scanned to check whether candidate sensor(s) with different combination of sensor state (i.e. ⁇ 1, 0, +1 ⁇ ) results in an abnormal run in the region of interest of the test data. If it is an abnormal run (run longer than N time instances and the run occurring only once) then the candidate sensor(s) along with the respective sensor state can be referred as a pattern.
- the reference data is scanned to check if the said pattern is also present in the reference data. If the pattern exists, then it is a normal event and can be discarded, else the pattern is stored as a candidate pattern as well as the start and end time of the abnormal event.
- the sensors also identified associated with the abnormal event by using the flagged values.
- the flagged values in the reference data are also analyzed to determine the longest streak of out of control limits event or abnormal event. The total time instance of longest streak is considered as the earliest detection time. If the candidate pattern has more than one abnormal sensor, then the latest start time among the abnormal run sensors is used as the earliest detection time. If the pattern appears in the reference data set then the run length of several runs (which does not satisfy the constraints of abnormal event) for that candidate pattern is identified.
- r is the run length for the candidate pattern in the reference data
- ⁇ is the mean value of run length for the candidate pattern in the reference data:
- R is the total number of runs for the candidate pattern in the reference data
- ⁇ is a constant
- ⁇ is the standard deviation among run length of candidate pattern in the reference data:
- r g is the run length of g th run for the candidate pattern in the reference data.
- the offset time can be computed as a function of maximum run length if the cost of false alarming is not defined.
- m is the maximum run length for the candidate pattern in the reference data
- ⁇ is the factor of safety
- r g is the run length of g th run for the candidate pattern in the reference data.
- an alert is generated for the users about the anomaly at the earliest and the results are consolidated to prepare a brief and detailed summary about the anomaly in the system.
- FIG. 3 is a flowchart, illustrating a method for data-driven anomaly detection if only test data is available, in accordance with an embodiment of the present invention.
- a region of interest from the test data is identified based on dimensionality reduction technique and change point detection algorithm, as in step 302 .
- the term “test data” is to be construed as “data” mentioned in the claims.
- the data or test data can be obtained from sensors attached to the system or from manual observation of the functioning of the system. In a preferred embodiment, the data is obtained from the sensors and this will be taken into consideration for describing the present technique but this is only for understanding purpose and does not intend to limit the scope of the disclosure.
- the data can be stored and extracted from a database or can be obtained from sensors directly in real time.
- the data may be preprocessed to remove incomplete and irrelevant data.
- the detail about the preprocessing of data is described hereinabove.
- the dimensionality reduction technique may include but is not limited to T 2 statistic.
- the details about computing T 2 statistic and identifying region of interest using change point algorithm is mentioned in detail herein above.
- the reference data can be obtained by removing the data points corresponding to the region of interest (RoI) from the test data.
- the reference data is classified based on the appropriate clustering technique into different groups, wherein the different groups represent different modes of operation of the system, as in step 304 .
- the details about the clustering technique are provided herein above.
- a control limit for each of the said groups is determined, as in step 306 .
- the details about the control limit determination are described herein above.
- the data within the region of interest are mapped with the said groups of the reference data based on the closeness between the mean vector of each group of the reference data and the actual sensor reading of the test data, as in step 308 .
- the sensor reading is flagged with ⁇ 1, 0, and 1 for each scenario as follows: if the sensor reading is lying outside the lower control limit then the corresponding value is flagged with ⁇ 1, else if the sensor reading is lying within the control limits then the corresponding value is flagged with 0, and if the sensor reading is lying outside the upper control limit then the corresponding value is flagged with 1.
- the resulting value can be called as flagged value.
- the flagging is performed for the reference data set. Thereafter, the at least one abnormal event is detected by applying a heuristic algorithm, as in step 312 .
- the sensors also identified associated with the abnormal event by using the flagged values.
- the flagged values in the reference data are also analyzed to determine the earliest detection time of the abnormal event which is described in great detail herein above.
- An alert is also generated for the users about the anomaly at the earliest and the results are consolidated to prepare a brief and detailed summary about the anomaly in the system.
- FIG. 5 is a block diagram illustrating a system for data-driven anomaly detection if two data sets namely reference data and test data are available, in accordance with an embodiment of the present invention.
- the system includes region of interest identification module 502 , mapping module 504 , data analysis module 506 , abnormal event detection module 508 , earliest time detection module 510 , alert generation module 512 and Rule Engine Database 514 .
- the region of interest identification module 502 is configured to identify a region of interest from the data based on dimensionality reduction technique and change point detection algorithm.
- the dimensionality reduction technique may include but is not limited to T 2 statistic. The details about computing T 2 statistic and identifying region of interest using change point algorithm is mentioned in detail herein above.
- test data is to be construed as “data” mentioned in the claims.
- the data or test data can be obtained from sensors attached to the system or from manual observation of the functioning of the system.
- the data is obtained from the sensors and this will be taken into consideration for describing the present technique but this is only for understanding purpose and does not intend to limit the scope of the disclosure.
- the data can be stored and extracted from a database or can be obtained from sensors directly in real time.
- the data may be preprocessed to remove incomplete and irrelevant data. The detail about the preprocessing of data is described hereinabove.
- the mapping module 504 is configured to map the data within the region of interest with one or more predefined groups of reference data representing one or more modes of operation of a system, wherein the reference data represent normal operating condition of the system.
- An appropriate clustering technique is used based on the type of reference data to classify the reference data into different groups which is described in great detail herein above.
- a control limit is determined for each group of the reference data based on the type of the reference data.
- the data analysis module 506 is configured to determine whether the data within the region of interest is outside of the predefined control limit of the corresponding mapped group. The sensor reading is flagged with ⁇ 1, 0, and 1 as described in detail herein above.
- the abnormal event detection module 508 is configured to detect at least one abnormal event by applying a heuristic algorithm on the data within the region of interest which are outside the control limit. The details about the abnormal event detection method are described herein above. According with an embodiment of the present disclosure, the sensors also identified associated with the abnormal event by using the flagged values.
- the earliest time detection module 510 is configured to determine an earliest detection time of the at least one abnormal event by identifying a pattern of abnormality in the data within the region of interest which are outside the control limit. The computing method of earliest detection time is described herein above in detail.
- the alert generation module 512 is configured to generate an alert on the occurrence of the at least one abnormal event.
- the Rule Engine Database 514 is configured to store predefined rules and rules given as an input by the user. The rules are segregated based on the different patterns exhibited by the sensors using the reference data. These rules are essential to identify the anomalies as well as to determine the earliest detection time.
- FIG. 6 is a block diagram illustrating a system for data-driven anomaly detection if only test data is available, in accordance with an embodiment of the present invention.
- the system includes region of interest identification module 602 , reference data classification module 604 , control limit determination module 606 , mapping module 608 , data analysis module 610 , abnormal event detection module 612 , earliest time detection module 614 , alert generation module 616 and Rule Engine Database 618 .
- the region of interest identification module 602 is configured to identify a region of interest from the data based on dimensionality reduction technique and change point detection algorithm.
- the dimensionality reduction technique may include but is not limited to T 2 statistic. The details about computing T 2 statistic and identifying region of interest using change point algorithm is mentioned in detail herein above.
- test data is to be construed as “data” mentioned in the claims.
- the data or test data can be obtained from sensors attached to the system or from manual observation of the functioning of the system.
- the data is obtained from the sensors and this will be taken into consideration for describing the present technique but this is only for understanding purpose and does not intend to limit the scope of the disclosure.
- the data can be stored and extracted from a database or can be obtained from sensors directly in real time.
- the data may be preprocessed to remove incomplete and irrelevant data. The detail about the preprocessing of data is described hereinabove.
- the reference data classification module 604 is configured to classify reference data into one or more groups representing one or more modes of operation of a system, wherein the reference data is obtained from a region outside the region of interest. The reference data is classified based on the appropriate clustering technique into different groups and the details about the clustering technique are provided herein above.
- the control limit determination module 606 is configured to determine a control limit for each of the one or more groups by analyzing the reference data. The details about the control limit determination are described herein above.
- the mapping module 608 is configured to map the data within the region of interest with the one or more groups based on the closeness between the mean vector of each group of the reference data and the actual sensor reading of the test data.
- the data analysis module 610 is configured to determine whether the data within the region of interest is outside the control limit of the mapped group.
- the sensor reading is flagged with ⁇ 1, 0, and 1 as described above.
- the abnormal event detection module 612 is configured to detect at least one abnormal event by applying a heuristic algorithm on the data within the region of interest which are outside the control limit. The details about the abnormal event detection method are described herein above. According with an embodiment of the present disclosure, the sensors also identified associated with the abnormal event by using the flagged values.
- the earliest time detection module 614 is configured to determine an earliest detection time of the at least one abnormal event by identifying a pattern of abnormality in the data within the region of interest which are outside the control limit. The computing method of earliest detection time is described herein above in detail.
- the alert generation module 616 is configured to generate an alert on the occurrence of the at least one abnormal event.
- the Rule Engine Database 618 is configured to store predefined rules and rules given as an input by the user. The rules are segregated based on the different patterns exhibited by the sensors using the reference data. These rules are essential to identify the anomalies as well as to determine the earliest detection time.
- One or more computer-readable media can comprise computer-executable instructions causing a computing system (e.g., comprising one or more processors coupled to memory) (e.g., computing environment 100 or the like) to perform any of the methods described herein.
- a computing system e.g., comprising one or more processors coupled to memory
- Examples of such computer-readable or processor-readable media include magnetic media, optical media, and memory (e.g., volatile or non-volatile memory, including solid state drives or the like).
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Physics (AREA)
- Mathematical Optimization (AREA)
- Computational Mathematics (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Life Sciences & Earth Sciences (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Evolutionary Biology (AREA)
- Bioinformatics & Computational Biology (AREA)
- Software Systems (AREA)
- Algebra (AREA)
- Databases & Information Systems (AREA)
- Probability & Statistics with Applications (AREA)
- Operations Research (AREA)
- Artificial Intelligence (AREA)
- Evolutionary Computation (AREA)
- Automation & Control Theory (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Testing And Monitoring For Control Systems (AREA)
- Computational Linguistics (AREA)
- Computing Systems (AREA)
Abstract
Description
-
- a) the length of the abnormal run is >N data points (continuous);
- b) an abnormal run occurs once and only once in the test data file;
- c) the abnormal run does not occur in the reference data file.
T i 2=(S j(i)−m j)S −1(S j(i)−m j)
u j =m j +b×d j
l j =m j −b×d j
ƒ(r)=β+τ×δ
ƒ(m)=α×{max(r g)}
Claims (20)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN2720/CHE/2013 | 2013-06-24 | ||
IN2720CH2013 | 2013-06-24 |
Publications (2)
Publication Number | Publication Date |
---|---|
US20140379301A1 US20140379301A1 (en) | 2014-12-25 |
US10552511B2 true US10552511B2 (en) | 2020-02-04 |
Family
ID=52111590
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/220,050 Active 2036-08-23 US10552511B2 (en) | 2013-06-24 | 2014-03-19 | Systems and methods for data-driven anomaly detection |
Country Status (1)
Country | Link |
---|---|
US (1) | US10552511B2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200014740A1 (en) * | 2018-07-06 | 2020-01-09 | Avigilon Corporation | Tile stream selection for mobile bandwith optimization |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150219530A1 (en) * | 2013-12-23 | 2015-08-06 | Exxonmobil Research And Engineering Company | Systems and methods for event detection and diagnosis |
US10148680B1 (en) * | 2015-06-15 | 2018-12-04 | ThetaRay Ltd. | System and method for anomaly detection in dynamically evolving data using hybrid decomposition |
EP3407198A1 (en) * | 2017-05-22 | 2018-11-28 | Siemens Aktiengesellschaft | System, device and method for frozen period detection in sensor datasets |
US11533326B2 (en) * | 2019-05-01 | 2022-12-20 | Oracle International Corporation | Systems and methods for multivariate anomaly detection in software monitoring |
DE102019213019B4 (en) * | 2019-08-29 | 2024-08-14 | Wago Verwaltungsgesellschaft Mbh | METHOD AND DEVICE FOR ANALYZING A PROCESS |
CN111581046A (en) * | 2020-03-19 | 2020-08-25 | 平安科技(深圳)有限公司 | Data abnormality detection method, device, electronic device and storage medium |
CN113139610A (en) * | 2021-04-29 | 2021-07-20 | 国网河北省电力有限公司电力科学研究院 | Abnormity detection method and device for transformer monitoring data |
US20240029002A1 (en) * | 2022-07-22 | 2024-01-25 | Dell Products L.P. | Method and system for identifying anomalies in compensation data |
CN115618766B (en) * | 2022-11-08 | 2023-04-04 | 中国航发四川燃气涡轮研究院 | Algorithm capable of eliminating dead pixels of aero-engine flow passage test data in real time |
CN117978516B (en) * | 2024-02-21 | 2025-04-11 | 北京火山引擎科技有限公司 | Alarm data processing method, device, medium and electronic equipment |
CN118965216B (en) * | 2024-07-17 | 2025-09-19 | 北京理工大学 | Welding implicit anomaly detection and identification method based on multi-source data |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5566092A (en) * | 1993-12-30 | 1996-10-15 | Caterpillar Inc. | Machine fault diagnostics system and method |
US20070289013A1 (en) | 2006-06-08 | 2007-12-13 | Keng Leng Albert Lim | Method and system for anomaly detection using a collective set of unsupervised machine-learning algorithms |
US20080168339A1 (en) | 2006-12-21 | 2008-07-10 | Aquatic Informatics (139811) | System and method for automatic environmental data validation |
US20090002148A1 (en) * | 2007-06-28 | 2009-01-01 | Microsoft Corporation | Learning and reasoning about the context-sensitive reliability of sensors |
US7561991B2 (en) | 2003-02-18 | 2009-07-14 | Nec Corporation | Detection of abnormal behavior using probabilistic distribution estimation |
WO2010111748A1 (en) | 2009-04-01 | 2010-10-07 | Curtin University Of Technology | Systems and methods for detecting anomalies from data |
US20100299118A1 (en) | 2008-02-22 | 2010-11-25 | Ratnesh Kumar Sharma | Detecting Anomalies In A Sensor Networked Environment |
US8588484B2 (en) * | 2007-06-22 | 2013-11-19 | Warwick Warp Limited | Fingerprint matching method and apparatus |
US20140032506A1 (en) * | 2012-06-12 | 2014-01-30 | Quality Attributes Software, Inc. | System and methods for real-time detection, correction, and transformation of time series data |
-
2014
- 2014-03-19 US US14/220,050 patent/US10552511B2/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5566092A (en) * | 1993-12-30 | 1996-10-15 | Caterpillar Inc. | Machine fault diagnostics system and method |
US7561991B2 (en) | 2003-02-18 | 2009-07-14 | Nec Corporation | Detection of abnormal behavior using probabilistic distribution estimation |
US20070289013A1 (en) | 2006-06-08 | 2007-12-13 | Keng Leng Albert Lim | Method and system for anomaly detection using a collective set of unsupervised machine-learning algorithms |
US20080168339A1 (en) | 2006-12-21 | 2008-07-10 | Aquatic Informatics (139811) | System and method for automatic environmental data validation |
US8588484B2 (en) * | 2007-06-22 | 2013-11-19 | Warwick Warp Limited | Fingerprint matching method and apparatus |
US20090002148A1 (en) * | 2007-06-28 | 2009-01-01 | Microsoft Corporation | Learning and reasoning about the context-sensitive reliability of sensors |
US20100299118A1 (en) | 2008-02-22 | 2010-11-25 | Ratnesh Kumar Sharma | Detecting Anomalies In A Sensor Networked Environment |
CN101946238A (en) | 2008-02-22 | 2011-01-12 | 惠普开发有限公司 | Detecting anomalies in a sensor-networked environment |
US8626889B2 (en) | 2008-02-22 | 2014-01-07 | Hewlett-Packard Development Company, L.P. | Detecting anomalies in a sensor-networked environment |
WO2010111748A1 (en) | 2009-04-01 | 2010-10-07 | Curtin University Of Technology | Systems and methods for detecting anomalies from data |
US20120063641A1 (en) * | 2009-04-01 | 2012-03-15 | Curtin University Of Technology | Systems and methods for detecting anomalies from data |
US20140032506A1 (en) * | 2012-06-12 | 2014-01-30 | Quality Attributes Software, Inc. | System and methods for real-time detection, correction, and transformation of time series data |
Non-Patent Citations (9)
Title |
---|
"Non-linear dimensionality reduction techniques for unsupervisedfeature extraction" S. De Backer, A. Naud, P. Scheunders )Vision Lab, Department of Physics, University of Antwerp, revised Jan. 30, 1998. * |
A novel changepoint detection algorithm, Allen B. Downey, Dec. 5, 2008. * |
Das et al., "Detecting Anomalous Records in Categorical Datasets,"KDD'07, Aug. 12-15, 2007, San Jose, CA, 10 pages. |
Downey, "A novel changepoint detection algorithm", arXiv.org, 2008. * |
Hotelling's T-squared distribution, https://en.wikipedia.org/wiki/Hotelling%27s_T-squared_distribution, accessed Mar. 13, 2019. * |
Mujica et al., "Q-statistic and T2-statistic PCA-based measures for damage assessment in structures", SHM 10(5) 2010, 539-533. * |
Mujica et al., "Q-statistic and T2-statistic PCA-based measures for damage assessment in structures", Structural Health Monitoring (2010). * |
Siripanodorn et al., "Anomaly Detection in Wireless Sensor Networks using Self-Organizing Map and Wavelets," International Journal of Communications, vol. 4, Issue 3, 2010, 10 pages. |
Yao et al., "Online Anomaly Detection for Sensor Systems: a Simple and Efficient Approach," Performance Evaluation, vol. 67, Issue 11, Nov. 2010, pp. 1059-1075. |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200014740A1 (en) * | 2018-07-06 | 2020-01-09 | Avigilon Corporation | Tile stream selection for mobile bandwith optimization |
Also Published As
Publication number | Publication date |
---|---|
US20140379301A1 (en) | 2014-12-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10552511B2 (en) | Systems and methods for data-driven anomaly detection | |
CN103703487B (en) | Information identification method and system | |
US11250043B2 (en) | Classification of log data | |
US8886574B2 (en) | Generalized pattern recognition for fault diagnosis in machine condition monitoring | |
Entezami et al. | On continuous health monitoring of bridges under serious environmental variability by an innovative multi-task unsupervised learning method | |
CN108170909B (en) | Intelligent modeling model output method, equipment and storage medium | |
US20160369777A1 (en) | System and method for detecting anomaly conditions of sensor attached devices | |
CN108182515B (en) | Intelligent rule engine rule output method, equipment and computer readable storage medium | |
US20170315961A1 (en) | System analyzing device, system analyzing method and storage medium | |
CN109766958B (en) | A kind of data preprocessing method and device for data fusion | |
US20220058171A1 (en) | Leveraging a collection of training tables to accurately predict errors within a variety of tables | |
CN118013396A (en) | Industrial data management system and method based on edge computing | |
Atzmueller et al. | Anomaly detection and structural analysis in industrial production environments | |
Nagolu et al. | Real-time forest fire detection using IoT and smart sensors | |
CN119271520B (en) | Keyboard mouse intelligent control system based on thing networking | |
Adapala et al. | Breast cancer classification using svm and knn | |
CN118900277B (en) | Remote fault detection method for intelligent terminal ticket vending machine | |
CN110991940A (en) | Ocean observation data product quality online inspection method and device and server | |
CN117909970A (en) | Data processing method, device, equipment and medium | |
CN118013377A (en) | Forest intelligent management method and related device | |
Aquize et al. | Self-organizing maps for anomaly detection in fuel consumption. Case study: Illegal fuel storage in Bolivia | |
EP4379671A1 (en) | Assessment of input-output datasets using local complexity values and associated data structure | |
CN114446023A (en) | A configuration method in the scenario of smart fire alarm push | |
EP2915059B1 (en) | Analyzing data with computer vision | |
Abitova et al. | Comparative Analysis of ML Algorithms for Fraud Detection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INFOSYS LIMITED, INDIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SHASTRI, LOKENDRA;RAJ, KOLANDAISWAMY ANTONY AROKIA DURAI;KANAGASABAPATHI, BALASUBRAMANIAN;SIGNING DATES FROM 20141225 TO 20141229;REEL/FRAME:035207/0302 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: AWAITING TC RESP., ISSUE FEE NOT PAID |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |